Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct

Similar presentations


Presentation on theme: "Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct"— Presentation transcript:

1 Selective scalable secret image sharing with adaptive pixel-embedding technique
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct Authors: Jung-San Lee, Ying-Chin Chen, Hong-Chi Su Speaker:Yun-Hao Hsieh Date:2018/7/11

2 Outline Introduction Preliminaries Proposed mechanism
Experimental results and analysis Conclusions

3 Introduction(1/2) – (t, n) threshold
(3, 5) (4, 5)

4 Introduction(2/2) – Secret image sharing
Cover image Result of shadows 3 shadows (3, 5) 4 shadows 5 shadows

5 Preliminaries(1/5) – Scalable secret image sharing
Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows

6 Preliminaries(2/5) – Selective scalable secret image sharing
Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows

7 Preliminaries(3/5) – Meaningful shadow
Secret image Cover image good PSNR good SSIM

8 Preliminaries(4/5) – No pixel expansion
Cover image Secret image Preserve system performance

9 Preliminaries(5/5) – Verification
Cover image Result of shadows 3 shadows LSB Integrity 4 shadows 5 shadows

10 Proposed mechanism(1/5) - Sharing
(3, 5) 1000 Pixel 600 Pixel 200 Pixel

11 Proposed mechanism(2/5) - Sharing
(3, 5) (4, 5) (5, 5) 290 Pixel 600 Pixel 200 Pixel 200 Pixel (10,15,20) (1, 45) (2, 120) (3, 235) (5, 83) (4, 139)

12 Proposed mechanism(3/5) - Embedding
290 Pixel 2500 Pixel

13 Proposed mechanism(4/5) – Decrypting and verification
(3, 5) 290 Pixel 2500 Pixel

14 Proposed mechanism(5/5) – Decrypting and verification
(3, 5) 3 shadows 4 shadows (1, 45) (2, 120) (3, 235) 5 shadows

15 Experimental results and analysis(1/3)
(3, 5) [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [15] Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Systems and Software 84(10):1726–1733 [16] Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283(9):1750–1762

16 Experimental results and analysis(2/3)
PSNR SSIM [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [9] Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Systems and Software 73(3): 405–414 [17] Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Systems and Software 80(7):1070–1076

17 Experimental results and analysis(3/3)

18 Conclusions Smooth scalability Selectivity Higher PSNR and SSIM

19 Thanks For listing


Download ppt "Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct"

Similar presentations


Ads by Google